From last time: Inlining pros and cons Pros –eliminate overhead of call/return sequence –eliminate overhead of passing args & returning results –can optimize.

Slides:



Advertisements
Similar presentations
Garbage collection David Walker CS 320. Where are we? Last time: A survey of common garbage collection techniques –Manual memory management –Reference.
Advertisements

P3 / 2004 Register Allocation. Kostis Sagonas 2 Spring 2004 Outline What is register allocation Webs Interference Graphs Graph coloring Spilling Live-Range.
Coalescing Register Allocation CS153: Compilers Greg Morrisett.
CS412/413 Introduction to Compilers Radu Rugina Lecture 37: DU Chains and SSA Form 29 Apr 02.
Tail Recursion. Problems with Recursion Recursion is generally favored over iteration in Scheme and many other languages – It’s elegant, minimal, can.
Program Representations. Representing programs Goals.
Common Sub-expression Elim Want to compute when an expression is available in a var Domain:
Recap from last time We were trying to do Common Subexpression Elimination Compute expressions that are available at each program point.
Vertically Integrated Analysis and Transformation for Embedded Software John Regehr University of Utah.
Representing programs Goals. Representing programs Primary goals –analysis is easy and effective just a few cases to handle directly link related things.
Feedback: Keep, Quit, Start
Next Section: Pointer Analysis Outline: –What is pointer analysis –Intraprocedural pointer analysis –Interprocedural pointer analysis (Wilson & Lam) –Unification.
Memory Allocation. Three kinds of memory Fixed memory Stack memory Heap memory.
Interprocedural analyses and optimizations. Costs of procedure calls Up until now, we treated calls conservatively: –make the flow function for call nodes.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts, Amherst Advanced Compilers CMPSCI 710.
From last time: live variables Set D = 2 Vars Lattice: (D, v, ?, >, t, u ) = (2 Vars, µ, ;,Vars, [, Å ) x := y op z in out F x := y op z (out) = out –
Approach #1 to context-sensitivity Keep information for different call sites separate In this case: context is the call site from which the procedure is.
CS 536 Spring Code generation I Lecture 20.
Inlining pros and cons (discussion). Inlining pros and cons Pros –eliminate overhead of call/return sequence –eliminate overhead of passing args & returning.
KQS More exercises/practice What about research frontier? Reading material Meetings for project Post notes more promptly.
Previous finals up on the web page use them as practice problems look at them early.
Another example p := &x; *p := 5 y := x + 1;. Another example p := &x; *p := 5 y := x + 1; x := 5; *p := 3 y := x + 1; ???
Tentative Schedule 20/12 Interpreter+ Code Generation 27/12 Code Generation for Control Flow 3/1 Activation Records 10/1 Program Analysis 17/1 Register.
Run time vs. Compile time
Direction of analysis Although constraints are not directional, flow functions are All flow functions we have seen so far are in the forward direction.
Recap from last time g() { lock; } h() { unlock; } f() { h(); if (...) { main(); } } main() { g(); f(); lock; unlock; } mainfgh ;;;;;;; u u ” ”””” ” ”
ESP [Das et al PLDI 2002] Interface usage rules in documentation –Order of operations, data access –Resource management –Incomplete, wordy, not checked.
A simple approach Given call graph and CFGs of procedures, create a single CFG (control flow super-graph) by: –connecting call sites to entry nodes of.
Approach #1 to context-sensitivity Keep information for different call sites separate In this case: context is the call site from which the procedure is.
Another lock protocol example g() { if(isLocked()) { unlock; } else { lock; } } mainfg ;;;;; u ” ”””” ” ””” ” ” ”” ” ” ” ”””” u l l ” ””” ” ” ” ” ” {u,l}
Comparison Caller precisionCallee precisionCode bloat Inlining context-insensitive interproc Context sensitive interproc Specialization.
Recap from last time: live variables x := 5 y := x + 2 x := x + 1 y := x y...
Course project presentations Midterm project presentation Originally scheduled for Tuesday Nov 4 th Can move to Th Nov 6 th or Th Nov 13 th.
1 Run time vs. Compile time The compiler must generate code to handle issues that arise at run time Representation of various data types Procedure linkage.
Reps Horwitz and Sagiv 95 (RHS) Another approach to context-sensitive interprocedural analysis Express the problem as a graph reachability query Works.
Schedule Midterm out tomorrow, due by next Monday Final during finals week Project updates next week.
Direction of analysis Although constraints are not directional, flow functions are All flow functions we have seen so far are in the forward direction.
Transfer functions Our pairs of summaries look like functions from input information to output information We call these transfer functions Complete transfer.
Examples of summaries. Issues with summaries Level of “context” sensitivity: –For example, one summary that summarizes the entire procedure for all call.
Pointer analysis. Pointer Analysis Outline: –What is pointer analysis –Intraprocedural pointer analysis –Interprocedural pointer analysis Andersen and.
From last class. The above is Click’s solution (PLDI 95)
1.3 Executing Programs. How is Computer Code Transformed into an Executable? Interpreters Compilers Hybrid systems.
Precision Going back to constant prop, in what cases would we lose precision?
Data Flow in Static Profiling Cathal Boogerd, Delft University, The Netherlands Leon Moonen, Simula Research Lab, Norway ?
Bug Localization with Machine Learning Techniques Wujie Zheng
CSc 453 Runtime Environments Saumya Debray The University of Arizona Tucson.
COP4020 Programming Languages Subroutines and Parameter Passing Prof. Xin Yuan.
CS 326 Programming Languages, Concepts and Implementation Instructor: Mircea Nicolescu Lecture 9.
Compiler Optimizations ECE 454 Computer Systems Programming Topics: The Role of the Compiler Common Compiler (Automatic) Code Optimizations Cristiana Amza.
CS 343 presentation Concrete Type Inference Department of Computer Science Stanford University.
CS412/413 Introduction to Compilers Radu Rugina Lecture 18: Control Flow Graphs 29 Feb 02.
1 Control Flow Graphs. 2 Optimizations Code transformations to improve program –Mainly: improve execution time –Also: reduce program size Can be done.
Interprocedural analyses and optimizations. Costs of procedure calls Up until now, we treated calls conservatively: –make the flow function for call nodes.
Interprocedural analyses and optimizations. Costs of procedure calls Up until now, we treated calls conservatively: –make the flow function for call nodes.
ISBN Chapter 10 Implementing Subprograms.
LECTURE 19 Subroutines and Parameter Passing. ABSTRACTION Recall: Abstraction is the process by which we can hide larger or more complex code fragments.
Inter-procedural analysis
The Structuring of Systems Using Upcalls By David D. Clark Presented by Samuel Moffatt.
Implementing Subprograms
Storage Allocation Mechanisms
Compositional Pointer and Escape Analysis for Java Programs
For Example: User level quicksort program Three address code.
Implementing Subprograms
Inlining and Devirtualization Hal Perkins Autumn 2011
Pointer analysis.
Interprocedural analyses and optimizations
Where is all the knowledge we lost with information? T. S. Eliot
Procedure Linkages Standard procedure linkage Procedure has
Implementing Subprograms
Presentation transcript:

From last time: Inlining pros and cons Pros –eliminate overhead of call/return sequence –eliminate overhead of passing args & returning results –can optimize callee in context of caller and vice versa Cons –can increase compiled code space requirements –can slow down compilation –recursion? Virtual inlining: simulate inlining during analysis of caller, but don’t actually perform the inlining

Which calls to inline What affects the decision as to which calls to inline? –size of caller and callee (easy to compute size before inlining, but what about size after inlining?) –frequency of call (static estimates or dynamic profiles) –call sites where callee benefits most from optimization (not clear how to quantify) –programmer annotations (if so, annotate procedure or call site? Also, should the compiler really listen to the programmer?)

Which calls to inline The above metrics vary in how easy/hard they are to quantify Even if one were able to quantify all of them accurately, how does one put them together to make a decision? Inlining heuristics

Strategy 1: superficial analysis –examine source code of callee to estimate space costs, use this to determine when to inline –doesn’t account for post-inlining optimizations How can we do better?

Inlining heuristics Strategy 2: deep analysis –perform inlining –perform post-inlining analysis/optimizations –estimate benefits from opts, and measure code space after opts –undo inlining if costs exceed benefits –better accounts for post-inlining effects –much more expensive in compile-time How can we do better?

Inlining heuristics Strategy 3: amortized version of 2 [Dean & Chambers 94] –perform strategy 2: an inlining “trial” –record cost/benefit trade-offs in persistent database –reuse previous cost/benefit results for “similar” call sites

Inlining heuristics Strategy 4: use machine learning techniques For example, use genetic algorithms to evolve heuristics for inlining –fitness is evaluated on how well the heuristics do on a set of benchmarks –cross-populate and mutate heuristics Can work surprisingly well to derive various heuristics for compilres

Another way to remove procedure calls inf f(...) { if (...) return g(...);... return h(i(....), j(...)); }

Tail call eliminiation Tail call: last thing before return is a call –callee returns, then caller immediately returns Can splice out one stack frame creation and destruction by jumping to callee rather than calling –callee reuses caller’s stack frame & return address –callee will return directly to caller’s caller –effect on debugging?

Tail recursion elimination If last operation is self-recursive call, what does tail call elimination do?

Tail recursion elimination If last operation is self-recursive call, what does tail call elimination do? Transforms recursion into loop: tail recursion elimination –common optimization in compilers for functional languages –required by some language specifications, eg Scheme –turns stack space usage from O(n) to O(1)

Addressing costs of procedure calls Technique 1: try to get rid of calls, using inlining and other techniques Technique 2: interprocedural analysis, for calls that are left

Interprocedural analysis Extend intraprocedural analyses to work across calls Doesn’t increase code size But, doesn’t eliminate direct runtime costs of call And it may not be as effective as inlining at cutting the “precision cost” of procedure calls

A simple approach (discussion)

A simple approach Given call graph and CFGs of procedures, create a single CFG (control flow super-graph) by: –connecting call sites to entry nodes of callees (entries become merges) –connecting return nodes of callees back to calls (returns become splits) Cons: –speed? –separate compilation? –imprecision due to “unrealizable paths”

Another approach: summaries (discussion)

Code examples for discussion global a; a := 5; f(...); b := a + 10; global a; f(p) { *p := 0; } g() { a := 5; f(&a); b := a + 10; } h() { a := 5; f(&b); b := a + 10; }

Another approach: summaries Compute summary info for each procedure Callee summary: summarizes effect/results of callee procedures for callers –used to implement the flow function for a call node Caller summaries: summarizes context of all callers for callee procedure –used to start analysis of a procedure

Examples of summaries

Issues with summaries Level of “context” sensitivity: –For example, one summary that summarizes the entire procedure for all call sites –Or, one summary for each call site (getting close to the precision of inlining) –Or... Various levels of captured information –as small as a single bit –as large as the whole source code for callee/callers How does separate compilation work?

How to compute summaries Using Iterative analysis Keep the current solution in a map from procs to summaries Keep a worklist of procedures to process Pick a proc from the worklist, compute its summary using intraprocedural analysis and the current summaries for all other nodes If summary has changed, add callers/callees to the worklist for callee/caller summaries

How to compute callee summaries let m: map from proc to computed summary let worklist: work list of procs for each proc p in call graph do m(p) := ? for each proc p do worklist.add(p) while (worklist.empty.not) do let p := worklist.remove_any; // compute summary using intraproc analysis // and current summaries m let summary := compute_summary(p,m); if (m(p)  summary) m(p) := summary; for each caller c of p worklist.add(c)

Examples Let’s see how this works on some examples We’ll use an analysis for program verification as a running example

Protocol checking Interface usage rules in documentation –Order of operations, data access –Resource management –Incomplete, wordy, not checked Violated rules ) crashes –Failed runtime checks –Unreliable software

FSM protocols These protocols can often be expressed as FSMs For example: lock protocol Unlocked Locked lock unlock Error unlock lock *

FSM protocols Alphabet of FSM are actions that affect the state of the FSM Often leave error state implicit These FSMs can get pretty big for realistic kernel protocols

FSM protocol checking Goal: make sure that FSM does not enter error state Lattice:

Lock protocol example g() { lock; } h() { unlock; } f() { h(); if (...) { main(); } main() { g(); f(); lock; unlock; }

Lock protocol example g() { lock; } h() { unlock; } f() { h(); if (...) { main(); } } main() { g(); f(); lock; unlock; } mainfgh

Lock protocol example g() { lock; } h() { unlock; } f() { h(); if (...) { main(); } } main() { g(); f(); lock; unlock; } mainfgh ;;;;;;; u u ” ”””” ” ” l ” ””” ” ” l ” ”” ” ” ”” ” ” ””” ”” ” ” ”” ” ”” ” l ” ” ” ” ”” ” ” ” ” ” ”” ” ” ” ” ” ”” ” u u u u

Another lock protocol example g() { if(isLocked()) { unlock; } else { lock; } f() { g(); if (...) { main(); } main() { g(); f(); lock; unlock; }

Another lock protocol example g() { if(isLocked()) { unlock; } else { lock; } } mainfg f() { g(); if (...) { main(); } } main() { g(); f(); lock; unlock; }

Another lock protocol example g() { if(isLocked()) { unlock; } else { lock; } } mainfg ;;;;; u ” ”””” ” ””” ” ” ”” ” ” ” ”””” u l l ” ””” ” ” ” ” ” {u,l} f() { g(); if (...) { main(); } } main() { g(); f(); lock; unlock; } {u,l} ”” ” ” {u,e}

What went wrong?

We merged info from two call sites of g() Solution: summaries that keep different contexts separate What is a context?